Welcome!

News Feed Item

Blue Ridge Networks Wins 2018 Cybersecurity 'Hot Company' InfoSec Award

CHANTILLY, Va., April 17, 2018 /PRNewswire-USNewswire/ -- Blue Ridge Networks announced today that it has been selected as the "Hot Company" award winner in Cybersecurity, in the 2018 InfoSec Awards, presented by Cyber Defense Magazine. This week during the 2018 RSA Conference, Blue Ridge Networks and award winners from every category will be recognized and awarded.

Blue Ridge Networks named 'Hot Company' in Cyber Defense Magazine's 2018 InfoSec Awards.

This is the sixth annual InfoSec awards, honoring the most innovative and valuable contributors to the information security industry. The highly competitive awards program considers the contributions of nearly 3,000 InfoSec organizations around the world, and winners were selected by a committee of certified security professionals, based on their solutions and approach to next generation security threats.

Blue Ridge Networks was selected because of its impressive track record and overall approach to cybersecurity featuring Autonomous Network Segmentation (ANS). Blue Ridge Networks ANS is a self-contained cybersecurity ecosystem that protects organizations from vulnerabilities posed by connected devices, networks, and people. Based on the 'Zero Trust' methodology, ANS provides the highest level of security by seamlessly protecting the most sensitive infrastructure and allowing IT teams to focus on more critical functions.

This operationally transparent and versatile overlay solution enables organizations to seamlessly connect, isolate, contain, cloak, and manage users and devices over any transport, anywhere in the world – with minimal network configuration changes. ANS fills a significant need for impenetrable site to site communications, remote access, M2M communications, Industrial IoT/ OT security, and disaster recovery/workload failover. Today, as the complexity of both network devices and the attack methods used to breach them has increased, this strategy has proven to be the most efficient and reliable tactic for cybersecurity. 

"For more than 20 years our approach to security has ensured network security by eliminating vulnerabilities at their source," said John Higginbotham, CEO of Blue Ridge Networks.  "Using advanced network segmentation, isolation, and cloaking, this methodology has successfully and reliably prevented breaches since Blue Ridge Networks was founded. We are incredibly honored to be recognized by the InfoSec community as a leader in cybersecurity solutions as we continue providing the most effective security solutions possible for our customers across industries."

"Cybercrime, Hactivism, Cyberespionage, Ransomware and malware exploits are all on the rise," said Gary S. Miliefsky, Publisher, Cyber Defense Magazine. "Blue Ridge Networks has been distinguished as the Hot Company in Cybersecurity from our magazine. They won after we reviewed nearly 3,000 InfoSec companies, globally, because they are an innovator on a mission to help stop breaches and get one step ahead of the next threat, proactively."

For more information, please visit the Cyber Defense Magazine 2018 InfoSec Awards page, here.

ABOUT BLUE RIDGE NETWORKS 
Based in Northern Virginia, Blue Ridge Networks is a visionary cybersecurity pioneer that provides autonomous cybersecurity for the connected world. Blue Ridge Networks' Autonomous Cybersecurity Suite protects organizations from vulnerabilities posed by connected devices, endpoints, networks, and people. Blue Ridge solutions have protected critical operations for some of the largest US government, financial, healthcare, and other critical infrastructure customers for more than twenty years with no reported breaches.

ABOUT CYBER DEFENSE MAGAZINE  
With over 1.2 Million annual readers and growing, Cyber Defense Magazine is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and limited print editions exclusively for the RSA conferences and our paid subscribers. Learn more about us at http://www.cyberdefensemagazine.com. CDM is a proud member of the Cyber Defense Media Group.

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/blue-ridge-networks-wins-2018-cybersecurity-hot-company-infosec-award-300631373.html

SOURCE Blue Ridge Networks

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Deep learning has been very successful in social sciences and specially areas where there is a lot of data. Trading is another field that can be viewed as social science with a lot of data. With the advent of Deep Learning and Big Data technologies for efficient computation, we are finally able to use the same methods in investment management as we would in face recognition or in making chat-bots. In his session at 20th Cloud Expo, Gaurav Chakravorty, co-founder and Head of Strategy Development ...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
"I will be talking about ChatOps and ChatOps as a way to solve some problems in the DevOps space," explained Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...